Analysis
-
max time kernel
147s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
25-12-2024 21:26
Static task
static1
Behavioral task
behavioral1
Sample
YBCNP6X9PSJDXqv.exe
Resource
win7-20240903-en
General
-
Target
YBCNP6X9PSJDXqv.exe
-
Size
1.3MB
-
MD5
4dfab4ab0edef660557d063a7b787f32
-
SHA1
c55904a356c64da5812c07cdbc886fb64d80b2bb
-
SHA256
9ea19e6389c42486050f45551c33bf9d8f0b2417fc53975d97aebe477d368274
-
SHA512
94ca2be7e1ddd92abee498a1ccc44f7f79f14cab678faef4468000f2910b126aac2b4b423f050a78b2e03d1c7d19ec43908e49f6800b97dafe96de9d7a143489
-
SSDEEP
24576:c7XzodEMQ/3Q7+GOP0p2jQSM8eqIpQ916Ry/UE8izXOHtEga:cbzec3QCGd4jQB8LvocUdibOyga
Malware Config
Extracted
formbook
4.1
csn6
abmppo.club
a-great-dbt-cnsldtn-uk.fyi
intellidiets.com
giventt.com
mil-pay.com
endnotesg.xyz
balconygraze.xyz
cureply.online
musicmaster.digital
animevalhalla.com
nmtoinao.xyz
origotukau8.club
environmentalindustrial.com
loredanaprofumeria.com
marilynmarilynmarilyn.com
brodysinghhukpb.com
cangguavenue.com
themagicmoose.com
teamonston.com
cumthem.com
gteioeos.xyz
seylamapottery.com
fsts7.xyz
clanmeta.com
healingspaceyou.com
diskonmitsubishibali.com
gracelineage.com
freecoupon-engagementboost.com
utahorthotrauma.com
vaproor.com
fsptxd.xyz
2ymail.com
ramazanidavid.info
musicnwo.com
solfamidas.online
tnlakeretreat.com
fhastreamline123.info
friscowaterfrontwedding.com
idabelli.cloud
murrayresourcespodcast.com
delishishnes.com
liverpooldate.com
zentecfoundation.net
adaharmoni.com
onyxroseonline.com
etdrei.com
localtechnical.com
jazzartconnection.com
installfloors72hrs.com
melstefka.com
truth-index.com
daddybard.media
truckenergy.net
einleit.com
banqueescrow.net
jdavidtaxlawtookmymoney.com
chargeitonthedrive.com
cloud-hookah.com
thepottershousedemingnm.com
rustikal-wohnen.online
aprendoteca.site
thesirenseer.com
humalogichome.com
aitrainingacademy.net
dindeosh.com
Signatures
-
Formbook family
-
Formbook payload 3 IoCs
resource yara_rule behavioral1/memory/2740-11-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/2740-15-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/2992-20-0x0000000000080000-0x00000000000AF000-memory.dmp formbook -
Deletes itself 1 IoCs
pid Process 1528 cmd.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2268 set thread context of 2740 2268 YBCNP6X9PSJDXqv.exe 30 PID 2740 set thread context of 1260 2740 YBCNP6X9PSJDXqv.exe 21 PID 2992 set thread context of 1260 2992 mstsc.exe 21 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language YBCNP6X9PSJDXqv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mstsc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 28 IoCs
pid Process 2268 YBCNP6X9PSJDXqv.exe 2268 YBCNP6X9PSJDXqv.exe 2268 YBCNP6X9PSJDXqv.exe 2268 YBCNP6X9PSJDXqv.exe 2268 YBCNP6X9PSJDXqv.exe 2268 YBCNP6X9PSJDXqv.exe 2740 YBCNP6X9PSJDXqv.exe 2740 YBCNP6X9PSJDXqv.exe 2992 mstsc.exe 2992 mstsc.exe 2992 mstsc.exe 2992 mstsc.exe 2992 mstsc.exe 2992 mstsc.exe 2992 mstsc.exe 2992 mstsc.exe 2992 mstsc.exe 2992 mstsc.exe 2992 mstsc.exe 2992 mstsc.exe 2992 mstsc.exe 2992 mstsc.exe 2992 mstsc.exe 2992 mstsc.exe 2992 mstsc.exe 2992 mstsc.exe 2992 mstsc.exe 2992 mstsc.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 2740 YBCNP6X9PSJDXqv.exe 2740 YBCNP6X9PSJDXqv.exe 2740 YBCNP6X9PSJDXqv.exe 2992 mstsc.exe 2992 mstsc.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2268 YBCNP6X9PSJDXqv.exe Token: SeDebugPrivilege 2740 YBCNP6X9PSJDXqv.exe Token: SeDebugPrivilege 2992 mstsc.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 2268 wrote to memory of 2740 2268 YBCNP6X9PSJDXqv.exe 30 PID 2268 wrote to memory of 2740 2268 YBCNP6X9PSJDXqv.exe 30 PID 2268 wrote to memory of 2740 2268 YBCNP6X9PSJDXqv.exe 30 PID 2268 wrote to memory of 2740 2268 YBCNP6X9PSJDXqv.exe 30 PID 2268 wrote to memory of 2740 2268 YBCNP6X9PSJDXqv.exe 30 PID 2268 wrote to memory of 2740 2268 YBCNP6X9PSJDXqv.exe 30 PID 2268 wrote to memory of 2740 2268 YBCNP6X9PSJDXqv.exe 30 PID 1260 wrote to memory of 2992 1260 Explorer.EXE 31 PID 1260 wrote to memory of 2992 1260 Explorer.EXE 31 PID 1260 wrote to memory of 2992 1260 Explorer.EXE 31 PID 1260 wrote to memory of 2992 1260 Explorer.EXE 31 PID 2992 wrote to memory of 1528 2992 mstsc.exe 32 PID 2992 wrote to memory of 1528 2992 mstsc.exe 32 PID 2992 wrote to memory of 1528 2992 mstsc.exe 32 PID 2992 wrote to memory of 1528 2992 mstsc.exe 32
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:1260 -
C:\Users\Admin\AppData\Local\Temp\YBCNP6X9PSJDXqv.exe"C:\Users\Admin\AppData\Local\Temp\YBCNP6X9PSJDXqv.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2268 -
C:\Users\Admin\AppData\Local\Temp\YBCNP6X9PSJDXqv.exe"C:\Users\Admin\AppData\Local\Temp\YBCNP6X9PSJDXqv.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2740
-
-
-
C:\Windows\SysWOW64\mstsc.exe"C:\Windows\SysWOW64\mstsc.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2992 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\YBCNP6X9PSJDXqv.exe"3⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:1528
-
-